Download Participant Attack on Three-party Quantum key Agreement with Two

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

T-symmetry wikipedia , lookup

Bell's theorem wikipedia , lookup

EPR paradox wikipedia , lookup

Quantum teleportation wikipedia , lookup

Quantum key distribution wikipedia , lookup

Transcript
Int J Theor Phys (2016) 55:55–61
DOI 10.1007/s10773-015-2632-0
Participant Attack on Three-party Quantum
key Agreement with Two-photon Entanglement
Zhen-Chao Zhu1 · Ai-Qun Hu1 · An-Min Fu2,3
Received: 27 October 2014 / Accepted: 27 March 2015 / Published online: 15 April 2015
© Springer Science+Business Media New York 2015
Abstract In a recent study (Yin et al. Int. J. Theor. Phys. 52, 3915-3921, 2013), Yin et
al. proposed a three-party quantum key agreement protocol based on two-qubit entangled
states, they claimed that the protocol could resist against the insider attack and each party
in the protocol had an equal contribution to the establishment of the final shared secret
key. However, in this study, we will show that the protocol is not secure, two dishonest
participants can conclude to determine the shared key alone. To avoid this flaw, a further
improved protocol is proposed.
Keywords Quantum key agreement · Two-qubit entangled states · Participant attack
How to establish a security key is an important critical issue in cryptography, early cryptologists usually assumed that there was a secure channel, the key could be exchanged
through in this channel. However, this assumption becomes unmanageable when the number of participants increases greatly, or when secure channel is not available. To get rid of
this awkward problem, in 1976, Diffie and Hellman introduced a kind of protocol [1], key
agreement (KA) protocol. In a KA protocol, each party can contribute fairly her/his part to
establish a shared secret key over an insecure public channel. Although the protocol [1] was
later proven vulnerable to Man -in-Middle attack as it does not provide authentication of the
communicating parties, the design philosophy of the protocol had fundamentally changed
Zhen-Chao Zhu
[email protected]
1
Information Security Research Center, Southeast University, Nanjing 210096, China
2
State Key Laboratory of Information Security, Institute of Information Engineering, Chinese
Academy of Sciences, Beijing 100093, China
3
School of Computer Science and Technology, Nanjing University of Science and Technology,
Nanjing 210094, China
56
Int J Theor Phys (2016) 55:55–61
the way cryptosystems might work. Since then, many researches have been focused on
designing new KA protocols or formalizing the security model for KA protocols [2–10].
However, the securities of the proposed protocols above are often designed based on trapdoor functions. Cryptologists often suppose that it is easy to compute trapdoor function f(x)
given the variable x but impossible to deduce x from f(x) without the trapdoor. However,
so far, no one has proved the existence of any one-way function with a trapdoor. In other
words, all the KA protocols above rely for their security on unproven mathematical assumptions, e.g. solving the discrete logarithm problem or factoring large numbers are difficult. In
addition, the discovery in 1994 by Shor for fast factorization of integers [11] with a polynomial algorithm in a quantum computer and the discovery in 1996 by Grover for searching an
unsorted database [12] with N entries in O(N1/2 ) time and using O(log N) storage space in
the linear quantum model cast more doubts on the existence of the trapdoor functions. The
security of these KA protocols face serious challenges, how to design KA protocols which
do not rely for their securities on unproven mathematical assumptions becomes urgent. Fortunately, in 2004, a new type of KA, quantum KA (QKA), was proposed by Zhou et al. [13],
the protocol uses quantum teleportation and maximally entangled states to generate secret
key over public channels, the security of the protocol is guaranteed by the principle of quantum mechanics. However, the study [14] showed that Zhou et al.’s protocol was not secure.
In 2010, Chong et al. presented a QKA protocol [15] based on BB84 protocol [16]. In 2013,
a multi-party QKA protocol, an extension of two-party QKA protocol [17], was proposed
by Shi et al. However, Liu et al. pointed out that Shi et al.’s protocol was not secure, then
they proposed a new multi-party QKA protocol using single particles [18]. Sun et al. gave an
improvement to Liu et al.’s protocol by introducing two additional unitary operations [19],
they claimed that the efficiency of the protocol could be raised for (N-1) times, where, N is
the number of the participants in the protocol. Furthermore, they claimed that the improved
protocol can overcome the privacy leakage problem existed in Liu et al.’s protocol. However,
the study [20] showed that any participant’s sub-key still could be deduced by other two participants next to him/her in Sun et al.’s improved protocol. Yin et al. proposed a three-party
QKA protocol based on two-qubit entangled states [21], they claimed that each party in the
protocol has an equal contribution to the establishment of the final shared secret key and the
protocol can resist against both the outsider attack and the insider attack. In 2014, Shukla
et al. proposed two QKA protocols based on Bell state and Bell measurement [22]. Huang
et al. presented a QKA protocol with the block transmission of EPR pairs [23]. To solve
the problem that QKA protocols cannot be immune to decoherence, Huang et al. proposed
another QKA protocol [24] based on BB84 protocol. Recently, Xu et al. presented another
three-party QKA protocol based on GHZ (Greenberger -Horne-Zeilinger) states [25].
Through analyzing the above introduction, we can see that QKA is being a new research
hotspot in cryptography, more and more protocols were proposed. However, the cryptanalysis of QKA protocol has not drawn enough attention. As that described by Gao et al. in [26],
cryptanalysis plays an important role in the development of cryptography, it estimates a protocol’s security level, finds potential loopholes, and tries to overcome security issues. In the
study of quantum cryptography, quite a few effective attack strategies have been proposed,
such as entanglement-swapping attacks [27], channel-loss attacks [28], denial-of-service
attacks [29], Trojan horse attacks [30], participant attacks [31] and so on. Understanding
those attacks will be helpful for us to design new schemes with high security. In these kinds
of attacks, we should pay more attention to the participant attacks. In contrast to an outside
attacker, an inside participant, especially in a multi-party quantum cryptography protocol,
usually has more power to attack the protocol for her/his participant identity. Later studies
Int J Theor Phys (2016) 55:55–61
57
showed that quite a number of quantum cryptographic protocols could not resist participant
attacks [32–37].
In this paper, we will show that Yin et al.’s protocol [21] is not secure against participant
attack. Through launching a special kind of attack, two dishonest participants can totally offset the third participant’s role in the generation of the final key, they can determine the final
shared key alone. To avoid the flaw, a further improved protocol is proposed. To maintain
the integrity of the paper, let us give a brief review of the Yin protocol which is composed
of the following 7 steps.
Step 1 Participant Alice (Bob, Charlie) generates a random string KA (KB , KC ), where,
KJ = {j1 , ...jn } , J ∈ {A, B, C} , j ∈ {a, b, c} , ai , bi , ci ∈ {0,1} , i = 1, ...n. In the
meanwhile, Alice (Bob, Charlie) prepares n EPR pairs ψ + A A ψ + B B , ψ + C C
1 2
1 2
1 2
and then takes
pair to form sequences
the first and the second particle from each
SA1 SB1 , SC1 and SA2 SB2 , SC2 respectively, where, ψ + = √1 (|01 + |10). To
2
check the security of the transmission, each participant prepares enough decoy photons
which are randomly chosen from
Z-basis
{|0 , |1} or X-basis {|+ , |−} and then randomly
inserts
them
into
S
S
,
S
A2
B2 C2 . Alice (Bob, Charlie) sends the mixed sequence
SA2 SB2 , SC2 to Bob (Charlie, Alice).
Step 2 After having
been confirmed that Bob (Charlie, Alice) has received the sequence
SA2 SB2 , SC2 , Alice (Bob, Charlie) announces the position and the basis of each decoy
particle. Bob (Charlie, Alice) and Alice (Bob, Charlie) check the security of the channel.
If the error rate exceeds the threshold, they restart the protocol.
Step 3 Bob (Charlie, Alice) picks out the decoy particles
from the sequence
SA2 SB2 , SC2 and then performs unitary operation Ubi Uci , Uai (i= 1,2,...,n) on the
rest particles to form sequence SA1 2 SB1 2 , SC1 2 , where,U0 = I = |0 0| + |1 1| , U1 =
σx = |0 1| + |1 0|. In the meanwhile, Bob (Charlie,
Alice)
prepares enough decoy
1
1
1
photons and then randomly inserts them into SA2 SB2 , SC2 . Bob (Charlie, Alice) sends
the mixed sequence SA1 2 SB1 2 , SC1 2 to Charlie (Alice, Bob).
Step4 After having
been confirmed that Charlie (Alice, Bob) has received the sequence
SA1 2 SB1 2 , SC1 2 , Bob and Charlie (Charlie and Alice, Alice and Bob) perform the second eavesdropping check. If the error rate exceeds the threshold, two parties abort this
protocol.
Step 5 Charlie
from the sequence
(Alice, Bob) first picks out decoy photons
1
1
1
SA2 SB2 , SC2 and then performs unitary operation U2ci U2ai , U2bi (i= 1,2,...,n) on
the rest particles to form sequence SA2 2 SB2 2 , SC2 2 , where, U0 = I = |0 0| + |1 1|,
U2 = σz = |0 0| − |1 1|. In the meanwhile, Charlie
(Alice, Bob) prepares enough
decoy photons and then randomly inserts them into SA2 2 SB2 2 , SC2 2 . Charlie (Alice, Bob)
sends the sequence to Alice (Bob, Charlie).
Step6 After having
been confirmed that Alice (Bob, Charlie) has received the sequence
2
2
2
SA2 SB2 , SC2 , two parties perform the third security check. If they confirm that the
transmission is insecure, this process is aborted.
58
Int J Theor Phys (2016) 55:55–61
Step 7 Alice (Bob, Charlie) picks out the decoy particles from the sequence
SA2 2 SB2 2 , SC2 2 and then performs Bell-state measurement on the corresponding particles
in sequences SA1 SB1 , SC1 and SA2 2 SB2 2 , SC2 2 . According to the measurement results,
each party can obtain the other two parties’ secret keys. Thus they can determine the final
shared secret key K = KA ⊕ KB ⊕ KC .
As that pointed out by Sun et al. in [19], one principle in the design of QKA protocol is that the protocol should have fairness property, that is, all involved participants are
equally to influence the final shared key. In other words, no non-trivial subset of the participants can determine the shared key. Yin et al. claimed that each participant in their
proposed protocol has an equal contribution to the establishment of the shared secret key
and three participants are entirely peer entities [21]. However, we will show that two dishonest participants in Yin et al.’s protocol can conclude to determine the shared key alone,
in the next, we will show how two dishonest participants can do this. Without loss of generality, we suppose that Alice and Bob are two dishonest participants. In step 3, Alice
and Bob can disguised as legitimate participants to perform unitary operation on the corresponding particles. In step 5, it is obviously that Alice and Bob can deduce Charlie’s
unitary operations though measuring the particle pairs in which one particle has been performed unitary operation by Charlie. Then Bob can choose different unitary operations to
perform on the particles and then send these particles to the honest participant Charlie. The
role of the honest participant in the generation of the final key can be totally offset by this
different unitary operations, the final key will be only determined by these two dishonest participants, so the protocol is not secure against the participant attack. In the next, we
give the details of our proposed attack. In step 3, Bob (Charlie, Alice) first picks out the
decoy photons and then performs unitary operation Ubi Uci , Uai on the rest particles in the
sequence SA2 SB2 , SC2 to form sequence SA1 2 SB1 2 , SC1 2 . Bob (Charlie, Alice) prepares
enough decoy photons and then randomly inserts them into the sequence SA1 2 SB1 2 , SC1 2 .
Bob (Charlie, Alice) sends the mixed sequence SA1 2 SB1 2 , SC1 2 to Charlie (Alice, Bob).
After checking the security of the quantum transmitting, Bob can deduce Charlie’s unitary
operation with the help of Alice through performing Bell-state measuring on the corre sponding particles in sequences SB1 and SB1 2 . For example, if Bob and Alice get result ψ + ,
they can deduce that Charlie’s unitary operation is U0 , which
that the corresponding
means
bit of Charlie’s sub key is 0. If Bob and Alice get result φ + , they can deduce that Charlie’s unitary operation is U1 , which means that the corresponding bit of Charlie’s sub key is
1. After the Step 4 having been completed, Bob holds sequences SB1 and SC1 2 , Alice holds
sequences SA1 and SB1 2 . If all the parties are honest, in the next, Bob will perform unitary
operation U2bi on the corresponding particle in the sequence SC1 2 to form sequence SC2 2 and
then send the sequence to Charlie, Alice will perform unitary operation U2ai on the corresponding particle in the sequence SB1 2 to form sequence SB2 2 and then send the sequence to
Bob, Charlie performs U2ci on the corresponding particle in SA1 2 to form sequence SA2 2 and
then send the sequence to Alice. Charlie (Alice, Bob) can deduce other two parties’ sub keys
through performing Bell-state
measurement
on the corresponding particles in sequences
2
2
2
SC1 SA1 , SB1 and SC2 SA2 , SB2 . We give the following Table 1 to show the relations
among Alice’s (Bob’s, Charlie’s) first unitary operations, Bob’s (Charlie’s, Alice’s) second
unitary operations and Charlie’s (Alice’s, Bob’s) measurement results.
Int J Theor Phys (2016) 55:55–61
59
Table 1 Relations among Alice’s (Bob’s, Charlie’s) first unitary operations, Bob’s (Charlie’s, Alice’s) second unitary operations and Charlie’s (Alice’s, Bob’s) measurement results. Alice’s (Bob’s, Charlie’s) first
unitary operations are listed in the first column, Bob’s (Charlie’s, Alice’s) second unitary operations are listed
in the first row
U0 (0)
U1 (1)
U0 (0)
U2 (1)
+
ψ (0 ⊕ 0)
+
φ (1 ⊕ 0)
−
ψ (0 ⊕ 1)
−
φ (1 ⊕ 1)
However, if Bob chooses a different unitary operation I ⊗ U2ci I ⊗ U2bi to perform
on the corresponding particle in sequence SC1 2 to form sequence SC3 2 , through analyzing
Yin et al.’s protocol, we can deduce that
particle pair in sequences SC1
the corresponding
and SC3 2 is in state I ⊗ U2ci I ⊗ U2bi I ⊗ Uai ψ + C C . We give the following Table 2 to
1 2
show the relations among Alice’s sub keys, Bob’s sub keys, Charlie’s sub keys and Charlie’s
measurement results after Bob has performed I ⊗ U2ci I ⊗ U2bi on the corresponding
particle in sequence SC1 2 . Bob prepares enough decoy photons and then inserts them into
sequence SC3 2 randomly. Bob sends SC3 2 instead of SC2 2 to Charlie. After having confirmed
the security of the quantum transmission, Charlie performs Bell-state measurement on the
photon pairs in his two sequences to deduce the final shared key. However, the final key
K = KA ⊕ KB ⊕ KC ⊕ KC = KA ⊕ KB will be only determined by Alice and Bob, Charlie
can’t detect this kind of attack.
As seen in Table 2, through performing a different unitary operation on the corresponding particles in sequence SC1 2 according to his own sub key and Charlie’s sub key,
Bob can totally offset the role of Charlie in the generation of the final key, the final
key is only determined by Bob and Alice, the protocol is not secure against the insider
attack. We take a 4 bits key generation process as an example to show this attack, without loss of generality, we suppose that Alice and Bob want to generate a predetermined
key K = 1111, they can randomly generate a 4 bits string R = 0101 as Alice’s sub
key KA = 0101, KB = K ⊕ KA = 1111 ⊕ 0101 = 1010. After having received the
sequence SC2 from Charlie, Alice performs unitary operation Uai (i = 1, 2, 3, 4) on the ith
particle in sequence SC2 , where, a1 = 0, a2 = 1, a3 = 0, a4 = 1. Without loss of generality, we suppose that Alice and Bob deduce that Charlie’s sub key is 1101, after
having
received sequence SC1 2 from Alice, Bob performs unitary operation I ⊗ U2ci I ⊗ U2bi
(i = 1, 2, 3, 4) on the ith particle in sequence SC1 2 and then sends the sequence back to
Charlie, where, b1 = 1, b2 = 0, b3 = 1, b4 = 0, c1 = 1, c2 = 1, c3 = 0, c4 = 1. Charlie
on
+performs
Bell-state
measurement
−the
corresponding photon pairs, he will get results
ψ
φ −
ψ −
φ
,
,
and
, which means that the corresponding bits in
C1 C2
C1 C2
C1 C2
C1 C2
Alice’s and Bob’s sub keys are 00, 11, 01, and 11 respectively. We know that Charlie’s
sub key is 1101, in this case, Charlie can deduce the final shared key through computing
Table 2 Relations among Alice’s sub keys,
Bob’ssub keys, Charlie’s sub keys and Charlie’s measurement
results after Bob has performed I ⊗ U2ci I ⊗ U2bi on the corresponding particles in SC1 2 . Charlie’s sub keys
are listed in the first column, Alice’s sub keys and Bob’s sub keys are listed in the first row
0
1
00
01
10
11
+
ψ
(00)
− C1 C2
ψ
(01)
C C
−
ψ
(01)
+ C1 C2
ψ
(00)
C C
+
φ
(10)
− C1 C2
φ
(11)
C C
−
φ
(11)
+ C1 C2
φ
(10)
C C
1 2
1 2
1 2
1 2
60
Int J Theor Phys (2016) 55:55–61
the equation K = (0 ⊕ 0 ⊕ 1, 1 ⊕ 1 ⊕ 1, 0 ⊕ 1 ⊕ 0, 1 ⊕ 1 ⊕ 1) = 1111, which in fact has
been determined before the execution of the protocol.
The above analysis shows that two dishonest participants in Yin et al.’s protocol [21]
can conclude to determine the shared key alone, the protocol can’t resist against participant
attack. Actually, to avoid the above attack, we should make sure that any two dishonest
participants can’t choose a suitable unitary operation to offset the role of the third parties’
sub key in the generation of the final secret shared key. Inspired by the reference [22], we
give an improved protocol as follows. In step 3, after having performed unitary operation
Uji (i= 1,2,...,n) on each particle in the sequence SJ2 to form sequence SJ12 , each participant applies a permutation operator (n )J on sequence SJ12 to form a new sequence SJ1∗2 .
In the meanwhile, each participant prepares enough decoy particles and then inserts them
into sequence SJ1∗2 . Each participant sends the mixed sequence SJ1∗2 to the next participant.
In the end of the protocol, three participants publicly announce the details of their permutation operators. Alice (Bob, Charlie) can deduce the shared key according to the Bell-state
measurement results and the details of Bob’s (Charlie’s, Alice’s) permutation operator.
In summary, we show that the Yin et al.’s QKA protocol [21] is not secure against participant attack. Two dishonest participants can totally offset the third participant’s role in the
generation of the final shared key by launching a special kind of attack. In order to avoid
this flaw, a further improved protocol is proposed.
Acknowledgments The authors would like to thank the anonymous reviewers and editor for their comments that improved the quality of this paper. This work is supported by the National Science Foundation
of China (Grant Nos. 61202448 and 61202352), the National High-Tech Research and Development Program of China (Grant No. 2013AA014001) and Collaborative Innovation Center of Wireless Communication
Technology.
References
1. Diffie, W., Hellman, M.: IEEE Trans. Inf. Theory 22, 644–654 (1976)
2. Ingemarsson, I., Tang, D.T., Wong, C.K.: IEEE Trans. Inf. Theory 28, 714–719 (1982)
3. Burmester, M., Desmedt, Y.: In: Advances in Cryptology-Eurocrypt’94, 275-286. Springer, Berlin
(1994)
4. Steiner, M., Tsudik, G., Waidner, M.: IEEE Trans. Parallel Distrib. Syst. 11, 769–780 (2000)
5. Bellare, M., Canetti, R., Krawczyk, H.: In: Proceedings of the 30th Annual Symposium on the Theory
of Computing, 419–428. ACM, New York (1998)
6. Bellare, M., Pointcheval, D., Rogaway, P.: In: Advances in Cryptology-Eurocrypt’00, 139–155.
Springer, Berlin (2000)
7. Bellare, M., Rogaway, P.: In: Advances in Cryptology-Crypto’94, 232–249. Springer, Berlin (1994)
8. Bellare, M., Rogaway, P.: In: Proceedings of the 27th Annual ACM Symposium on Theory of
Computing, 57–66. ACM, New York (1995)
9. Blake-Wilson, S., Johnson, D., Menezes, A.: In: Proceedings of 6th IMA International Conference on
Cryptography and Coding, 30–45. Springer, Berlin (1997)
10. Kudla, C., Paterson, K.G.: In: Advances in Cryptology-Asiacrypt’05, 549–565. Springer, Berlin (2005)
11. Shor, P.W.: In: Proceedings of 35th Annual Symposium on Foundations of Computer Science, 124–134.
IEEE, New York (1994)
12. Grover, L.K.: In: Proceedings of 28th Annual ACM Symposium on the Theory of Computing, 212–219.
ACM, New York (1996)
13. Zhou, N., Zeng, G., Xiong, J.: Electron. Lett. 40, 1149 (2004)
14. Chong, S.K., Tsai, C.W., Hwang, T.: Int. J. Theor. Phys. 50, 1793 (2011)
15. Chong, S.K., Hwang, T.: Opt. Commun. 283, 1192 (2010)
16. Bennett, C.H., Brassard, G.: In: Proceedings IEEE International Conference on Computers, Systems
and Signal Processing, 175–179. IEEE, New York (1984)
17. Shi, R.H., Zhong, H.: Quantum Inf. Process 12, 921 (2013)
Int J Theor Phys (2016) 55:55–61
18.
19.
20.
21.
22.
23.
24.
25.
26.
27.
28.
29.
30.
31.
32.
33.
34.
35.
36.
37.
Liu, B., Gao, F., Huang, W., Wen, Q.Y.: Quantum Inf. Process 12, 1797 (2013)
Sun, Z.W., Zhang, C., Wang, B.H., Li, Q., Long, D.Y.: Quantum Inf. Process 12, 3411 (2013)
Huang, W., Wen, Q.Y., Liu, B., Su, Q., Gao, F.: arXiv:2777.1308 (2013)
Yin, X.R., Ma, W.P., Liu, W.Y.: Int. J. Theor. Phys. 52, 3915 (2013)
Shukla, C., Alam, N., Pathak, A.: Quantum Inf. Process 13, 2391 (2014)
Huang, W., Wen, Q.Y., Liu, B., Gao, F., Sun, Y.: Quantum Inf. Process 13, 649 (2014)
Huang, W., Su, Q., Wu, X., Li, Y.B., Sun, Y.: Int. J. Theor. Phys. 53, 2891 (2014)
Xu, G.B., Wen, Q.Y., Gao, F., Qin, S.J.: Quantum Inf. Process 13, 2587 (2014)
Gao, F., Qin, S.J., Guo, F.Z., Wen, Q.Y.: Phys. Rev. A 84, 022344 (2011)
Zhang, Y.S., Li, C.F., Guo, G.C.: Phys. Rev. A 63, 036301 (2001)
Wójcik, A.: Phys. Rev. Lett. 90, 157901 (2003)
Cai, Q.Y.: Phys. Rev. Lett. 91, 109801 (2003)
Deng, F.G., Li, X.H., Zhou, H.Y., Zhang, Z.J.: Phys. Rev. A 72, 044302 (2005)
Gao, F., Qin, S.J., Wen, Q.Y., Zhu, F.C.: Quantum Inf. Comput. 7, 329 (2007)
Gao, F., Qin, S.J., Wen, Q.Y., Zhu, F.C.: Phys. Rev. A 76, 062324 (2007)
Gao, F., Wen, Q.Y., Zhu, F.C.: Phys. Lett. A 360, 748 (2007)
Gao, F., Guo, F.Z., Wen, Q.Y., Zhu, F.C.: Phys. Rev. Lett. 101, 208901 (2008)
Song, T.T., Zhang, J., Gao, F., Wen, Q.Y., Zhu, F.C.: Chin. Phys. B 18, 1333 (2009)
Gao, F., Qin, S.J., Wen, Q.Y., Zhu, F.C.: Opt. Commun. 283, 192 (2010)
Guo, F.Z., Qin, S.J., Gao, F., Lin, S., Wen, Q.Y., Zhu, F.C.: Eur. Phys. J. D 56, 445 (2010)
61